oss-sec mailing list archives

Re: CVE Request -- ModSecurity (X < 2.7.3): Vulnerable to XXE attacks


From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 03 Apr 2013 09:07:19 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/03/2013 06:23 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, Breno, vendors,

ModSecurity upstream has released v2.7.3 version: [1]
https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES

correcting one security flaw (from [2]): "It was reported that the
XML files parser of ModSecurity, a security module for the Apache
HTTP Server, was vulnerable to XML External Entity attacks. A
remote attacker could provide a specially-crafted XML file that,
when processed might lead to local files disclosure or,
potentially, excessive resources (memory, CPU) consumption."

References: [2] https://bugzilla.redhat.com/show_bug.cgi?id=947842 
[3] https://bugs.gentoo.org/show_bug.cgi?id=464188 [4]
https://secunia.com/advisories/52847/

Relevant upstream patch (seems to be the following): [5]
https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe

 Could you allocate a CVE id [*] for this?

Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
Security Response Team

[*] According to:
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ModSecurity there
doesn't seem to have been a CVE id allocated for this issue yet.

Please use CVE-2013-1915 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=F1yx
-----END PGP SIGNATURE-----


Current thread: